rkeene / hunter2Links
The "hunter2" password manager is a simple script-oriented password manager.
☆16Updated 6 years ago
Alternatives and similar repositories for hunter2
Users that are interested in hunter2 are comparing it to the libraries listed below
Sorting:
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- A Golang tool to whitelist ASN's based on organization name☆15Updated 3 years ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- Core module for Forgiva Enterprise connecting Forgiva Server to Forgiva Webclient.☆13Updated 3 years ago
- Determine Who Can Log In to an SSH Server☆30Updated 7 months ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- CloudFlare Worker Shell☆14Updated 5 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- Automate "airgapped" server proxy with ssh socks proxy☆101Updated 4 years ago
- D4 core software (server and sample sensor client)☆42Updated 2 years ago
- DNS logging, detection, ...☆15Updated 3 years ago
- AXFR all the things!☆28Updated 4 months ago
- Pure Python netflow and DNS correlation, with reusable Frame Streams, DnsTap and Protobuf implementations☆16Updated 5 months ago
- Extract, defang, resolve names and IPs from text☆23Updated last week
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆114Updated last year
- trustor (PoC)☆25Updated 4 years ago
- Network Tools☆34Updated 2 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆87Updated 3 years ago
- ☆16Updated 2 months ago
- Web on top of any protocol☆113Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Updated 5 years ago
- Clone network interface from one host as a tap interface on another host☆61Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Updated 7 years ago
- A scanner for DKIM selectors.☆12Updated 7 years ago
- iWar - The intelligent war dialer.☆29Updated 5 years ago
- ☆16Updated 4 years ago
- Silly proof-of-concept for a PDF chatroom☆20Updated 2 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 6 years ago